Secure big data ecosystem architecture: challenges and solutions

Big data ecosystems are complex data-intensive, digital–physical systems. Data-intensive ecosystems offer a number of benefits; however, they present challenges as well. One major challenge is related to the privacy and security. A number of privacy and security models, techniques and algorithms have been proposed over a period of time. The limitation is that these solutions are primarily focused on an individual or on an isolated organizational context. There is a need to study and provide complete end-to-end solutions that ensure security and privacy throughout the data lifecycle across the ecosystem beyond the boundary of an individual system or organizational context. The results of current study provide a review of the existing privacy and security challenges and solutions using the systematic literature review (SLR) approach. Based on the SLR approach, 79 applicable articles were selected and analyzed. The information from these articles was extracted to compile a catalogue of security and privacy challenges in big data ecosystems and to highlight their interdependencies. The results were categorized from theoretical viewpoint using adaptive enterprise architecture and practical viewpoint using DAMA framework as guiding lens. The findings of this research will help to identify the research gaps and draw novel research directions in the context of privacy and security in big data-intensive ecosystems.

[1]  Sudeep TanwarSudhanshu TyagiNeeraj Kumar,et al.  Multimedia Big Data Computing for IoT Applications , 2020 .

[2]  Guandong Xu,et al.  Big data analytics for preventive medicine , 2019, Neural Computing and Applications.

[3]  Z. Irani,et al.  Critical analysis of Big Data challenges and analytical methods , 2017 .

[4]  David Beer,et al.  How should we do the history of Big Data? , 2016 .

[5]  Eduardo Fernández-Medina,et al.  Main Issues in Big Data Security , 2016, Future Internet.

[6]  Asif Gill,et al.  Adaptive Cloud Enterprise Architecture , 2015, Intelligent Information Systems.

[7]  Rasim M. Alguliyev,et al.  The Obstacles in Big Data Process , 2017 .

[8]  P. Alam ‘N’ , 2021, Composites Engineering: An A–Z Guide.

[9]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[10]  Nilay Khare,et al.  Big data privacy: a technological perspective and review , 2016, Journal of Big Data.

[11]  Neeraj Kumar,et al.  Verification and validation techniques for streaming big data analytics in internet of things environment , 2018, IET Networks.

[12]  Danna Zhou,et al.  d. , 1840, Microbial pathogenesis.

[13]  Gordon Hull,et al.  Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data , 2015, Ethics and Information Technology.

[14]  Thorhildur Jetzek The Sustainable Value of Open Government Data: Uncovering the Generative Mechanisms of Open Data through a Mixed Methods Approach , 2015 .

[15]  Ira S. Rubinstein,et al.  Big Data: The End of Privacy or a New Beginning? , 2013 .

[16]  Mike Fleckenstein,et al.  Overview of Data Management Frameworks , 2018 .

[17]  J. Manyika Big data: The next frontier for innovation, competition, and productivity , 2011 .

[18]  U. Selvi,et al.  A Review of Big Data and Anonymization Algorithms , 2015 .

[19]  Publisher's Note , 2018, Anaesthesia.

[20]  Muhammad Imran,et al.  Big data management in participatory sensing: Issues, trends and future directions , 2017, Future Gener. Comput. Syst..

[21]  N. Kshetri Big data's impact on privacy, security and consumer welfare , 2014 .

[22]  S. Chauhan,et al.  Addressing big data challenges in smart cities: a systematic literature review , 2016 .

[23]  Robert Haimes,et al.  Visually exploring gigabyte data sets in real time , 1999, CACM.